{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T01:34:37Z","timestamp":1725586477884},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642219276"},{"type":"electronic","value":"9783642219283"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-21928-3_41","type":"book-chapter","created":{"date-parts":[[2011,6,17]],"date-time":"2011-06-17T17:48:53Z","timestamp":1308332933000},"page":"563-572","source":"Crossref","is-referenced-by-count":1,"title":["Generation of Pseudorandom Binary Sequences with Controllable Cryptographic Parameters"],"prefix":"10.1007","author":[{"given":"Amparo","family":"F\u00faster-Sabater","sequence":"first","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"41_CR1","doi-asserted-by":"publisher","first-page":"541","DOI":"10.3923\/itj.2008.541.544","volume":"7","author":"W.. Awad","year":"2008","unstructured":"Awad, W.: Bias in the Nonlinear Filter Generator Output Sequence. Information Technology Journal\u00a07(3), 541\u2013544 (2008)","journal-title":"Information Technology Journal"},{"key":"41_CR2","unstructured":"Bluetooth, Specifications of the Bluetooth system, Version 1.1, \n                    \n                      http:\/\/www.bluetooth.com\/"},{"key":"41_CR3","volume-title":"Discrete Mathematics","author":"N. Biggs","year":"2002","unstructured":"Biggs, N.: Discrete Mathematics, 2nd edn. Oxford University Press, New York (2002)","edition":"2"},{"key":"41_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1007\/3-540-48329-2_3","volume-title":"Advances in Cryptology - CRYPTO \u201993","author":"D. Coppersmith","year":"1994","unstructured":"Coppersmith, D., Krawczyk, H., Mansour, Y.: The shrinking generator. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol.\u00a0773, pp. 22\u201339. Springer, Heidelberg (1994)"},{"key":"41_CR5","unstructured":"Diehard Battery of Tests of Randomness (1995), \n                    \n                      http:\/\/i.cs.hku.hk\/~diehard\/"},{"key":"41_CR6","unstructured":"eSTREAM-The ECRYPT Stream Cipher Project (2007), \n                    \n                      http:\/\/www.ecrypt.eu.org\/stream\/"},{"key":"41_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1007\/BFb0000426","volume-title":"Advances in Cryptology - ASIACRYPT \u201994","author":"A. F\u00faster-Sabater","year":"1995","unstructured":"F\u00faster-Sabater, A., Caballero-Gil, P.: On the linear complexity of nonlinearly filtered PN-sequences. In: Safavi-Naini, R., Pieprzyk, J.P. (eds.) ASIACRYPT 1994. LNCS, vol.\u00a0917, pp. 80\u201390. Springer, Heidelberg (1995)"},{"key":"41_CR8","doi-asserted-by":"publisher","first-page":"679","DOI":"10.1016\/S0304-3975(00)00410-2","volume":"259","author":"A. F\u00faster-Sabater","year":"2001","unstructured":"F\u00faster-Sabater, A., Garcia, J.: An efficient algorithm to generate binary sequences for cryptographic purposes. Theoretical Computer Science\u00a0259, 679\u2013688 (2001)","journal-title":"Theoretical Computer Science"},{"issue":"3","key":"41_CR9","doi-asserted-by":"publisher","first-page":"530","DOI":"10.1016\/j.tcs.2008.09.030","volume":"409","author":"A. F\u00faster-Sabater","year":"2008","unstructured":"F\u00faster-Sabater, A., Caballero-Gil, P.: Strategic Attack on the Shrinking Generator. Theoretical Computer Science\u00a0409(3), 530\u2013536 (2008)","journal-title":"Theoretical Computer Science"},{"issue":"10","key":"41_CR10","doi-asserted-by":"publisher","first-page":"1518","DOI":"10.1016\/j.aml.2009.03.018","volume":"22","author":"A. F\u00faster-Sabater","year":"2009","unstructured":"F\u00faster-Sabater, A., Caballero-Gil, P.: Synthesis of Cryptographic Interleaved Sequences by Means of Linear Cellular Automata. Applied Mathematics Letters\u00a022(10), 1518\u20131524 (2009)","journal-title":"Applied Mathematics Letters"},{"key":"41_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"586","DOI":"10.1007\/978-3-642-12165-4_46","volume-title":"Computational Science and Its Applications \u2013 ICCSA 2010","author":"A. Fuster-Sabater","year":"2010","unstructured":"Fuster-Sabater, A., Delgado-Mohatar, O., Brankovic, L.: On the Linearity of Cryptographic Sequence Generators. In: Taniar, D., Gervasi, O., Murgante, B., Pardede, E., Apduhan, B.O. (eds.) ICCSA 2010. LNCS, vol.\u00a06017, pp. 586\u2013596. Springer, Heidelberg (2010)"},{"key":"41_CR12","volume-title":"Shift-Register Sequences","author":"S. Golomb","year":"1982","unstructured":"Golomb, S.: Shift-Register Sequences. Aegean Park Press, Laguna Hill California (1982)"},{"key":"41_CR13","unstructured":"GSM, Global Systems for Mobile Communications, \n                    \n                      http:\/\/cryptome.org\/gsm-a512.htm"},{"key":"41_CR14","doi-asserted-by":"publisher","first-page":"714","DOI":"10.1109\/TIT.2004.825256","volume":"50","author":"Y. Hu","year":"2004","unstructured":"Hu, Y., Xiao, G.: Generalized Self-Shrinking Generator. IEEE Trans. Inform. Theory\u00a050, 714\u2013719 (2004)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"41_CR15","volume-title":"Introduction to Finite Fields and Their Applications","author":"R. Lidl","year":"1986","unstructured":"Lidl, R., Niederreiter, H.: Introduction to Finite Fields and Their Applications. Cambridge University Press, Cambridge, England (1986)"},{"key":"41_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1007\/11863854_14","volume-title":"Sequences and Their Applications \u2013 SETA 2006","author":"K. Limniotis","year":"2006","unstructured":"Limniotis, K., Kolokotronis, N., Kalouptsidis, N.: Nonlinear Complexity of Binary Sequences and Connections with Lempel-Ziv Compression. In: Gong, G., Helleseth, T., Song, H.-Y., Yang, K. (eds.) SETA 2006. LNCS, vol.\u00a04086, pp. 168\u2013179. Springer, Heidelberg (2006)"},{"key":"41_CR17","unstructured":"NIST Test suite for random numbers, \n                    \n                      http:\/\/csrc.nist.gov\/rng\/"},{"key":"41_CR18","unstructured":"Rivest, R.: The RC4 Encryption Algorithm. RSA Data Sec., Inc. (March 1998), \n                    \n                      http:\/\/www.rsasecurity.com"},{"key":"41_CR19","series-title":"Lecture Notes in Computer Science","volume-title":"New Stream Cipher Designs","year":"2008","unstructured":"Robshaw, M.J.B., Billet, O. (eds.): New Stream Cipher Designs. LNCS, vol.\u00a04986. Springer, Heidelberg (2008)"},{"key":"41_CR20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-82865-2","volume-title":"Analysis and Design of Stream Ciphers","author":"R. Rueppel","year":"1986","unstructured":"Rueppel, R.: Analysis and Design of Stream Ciphers. Springer, New York (1986)"},{"key":"41_CR21","first-page":"65","volume-title":"Contemporary Cryptology, The Science of Information","author":"G.. Simmons","year":"1992","unstructured":"Simmons, G.: Contemporary Cryptology, The Science of Information, pp. 65\u2013134. IEEE Press, Los Alamitos (1992)"},{"issue":"3","key":"41_CR22","doi-asserted-by":"publisher","first-page":"1131","DOI":"10.1016\/j.asoc.2006.10.003","volume":"7","author":"S.K. Tan","year":"2007","unstructured":"Tan, S.K., Guan, S.: Evolving cellular automata to generate nonlinear sequences with desirable properties. Applied Soft Computing\u00a07(3), 1131\u20131134 (2007)","journal-title":"Applied Soft Computing"},{"issue":"1","key":"41_CR23","first-page":"27","volume":"2","author":"S.G. Teo","year":"2010","unstructured":"Teo, S.G., Simpson, L., Dawson, E.: Bias in the Nonlinear Filter Generator Output Sequence. International Journal of Cryptology Research\u00a02(1), 27\u201337 (2010)","journal-title":"International Journal of Cryptology Research"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications - ICCSA 2011"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-21928-3_41","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,28]],"date-time":"2019-03-28T23:52:16Z","timestamp":1553817136000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-21928-3_41"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642219276","9783642219283"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-21928-3_41","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}